Nokia, and Trend Micro, announced a Memorandum of Understanding to establish a strategic alliance focused on delivering network-based, best-of-breed content security solutions to enterprises.

The two established security leaders intend to leverage their respective strengths in the appliance and antivirus/content security marketplaces to provide businesses with content security solutions designed to be robust, rapidly deployable, easily maintained and have unmatched performance.

"Trend Micro’s proven innovation and market leadership in antivirus and content security solutions brings an important strategic component to Nokia’s best-of-breed network security system approach," said Dan MacDonald, vice president of product management and marketing, Nokia Internet Communications. "Together Nokia and Trend Micro will address the ubiquitous business problem of email borne exploits by delivering a unique, secure content management system that customers have been looking for and that offers key attributes like auto updating, statistical protection and unmatched performance and reliability."

The Nokia-Trend Micro purpose-built, secure content management system, Nokia Message Protector SC6600, aims to provide easy to deploy, defense-in-depth email protection through statistical virus protection, SPAM rejection and intelligent exploit rejection. The system is designed to ensure maximum integrity and uptime of the enterprise messaging infrastructure and internal tests show that it can scan more than 120,000 messages per hour. The Nokia Message Protector SC6600 will be exclusively available from Nokia and backed by its "First call, Final resolution" support network to ensure that customers have a single point of contact for all support issues.

Spotlight

(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Learn about personal data bankruptcy and the cost of privacy, security and compliance, delivering digital security to a mobile world, and much more.

As ISPs, hosting providers and online enterprises around the world continue suffering the effects of DDoS attacks, often the discussions that follow are, “What is the best way to defend our networks and our customers against an attack?”

The code redirects visitors to another URL where the Fiesta exploit kit is hosted, which then tries to detect and exploit several vulnerabilities in various software. If it succeeds, the visitors are saddled with a banking Trojan.

Looking for an Android-based tablet for your child but don't know which one to choose? If you are concerned about the device's protection against random hackers, Bluebox Security has just released a review of the nine most popular Android tablet models aimed specifically at children.